|More Security Articles on CIO Upate|
The Five Most Common Misconceptions of Enterprise Security
Misconception No.1: Over-Relying on Network Defenses Misconception No. 2: Believing the Hype of Technology and Tools Misconception No.4: Assuming Secure Software is Costly
"It's not people looking to get their hands on a new laptop, it's people looking to get their hands on the data of specific company," said Ed Adams, CEO of Security Innovation. "So it is a form of a targeted attack, a targeted social engineering attack, taking advantage of Starbucks and the proximity to companies."
In the past six months, Adam's firm has been retained by two very large, East coast companies in an effort to reverse engineer what happened to their employee's laptops and to help put in place measures to thwart future incidents.
The way the attacks work is an employee at the targeted firm is identifiedusually an executive. His or her habits are tracked. When they frequent a nearby Starbucks, the perpetrator waits and watches. As soon as the opportunity to make off with the target's laptop opens uplike when they go to place an orderthe laptop is swiped.
"I remember reading (something) not too long ago where people would actually stake out certain Starbucks knowing that people from Company 'X' frequented it at lunch time just looking for laptops , said Dave Marcus, Security Research and Communications manager for McAfee Avert Labs and the man who coined the term "Starbucks Stalkers."
"That's not exactly high-end crime. It's really dumpster diving when you come right down to it."
How widespread the problem is is hard to define since many targets will see the theft as a one-off incident; never connecting the theft to the data, said Andrew Berkuta, senior security evangelist at McAfee.
"If we look at the animal kingdom, we're just going to our favorite watering hole," said Berkuta. "Again, it's conservation of resources, (criminals are) not going to track (a target) across a complete city if they know they're going to the same coffee house."
And it's not only the loss of the laptop and it's data that is a problem. Using the target's contact lists, customer information, forms and other documents, criminals are launching very successful, surgical phishing campaigns that net a very good response rate because the recipients think they are dealing with a trusted source.
Berkuta calls this "barrel phishing" because it's "just like fishing in a barrel."
"Given a thread of truth in a phishing (attack), either a letter like a postal letter or an email or some type of document that somewhat looks legitimate, people may act on it in a higher hit rate than just sending a mass mailing," said Berkuta.
Two other somewhat less targetedbut no less dangerousattacks are also taking place at Starbucks, said Adams.
One is what he terms "Starbucks Skimmers," where culprits bring in RFiD readers to snag the name and credit card numbers off of cards that have RF (radio frequency) chips embedded in them; like many new bank cards and the Mobil SpeedPass type of key fobs.